27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Mozilla Thunderbird 12.x < 12 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6498 FAMILY: SMTP Clients RISK: HIGH NESSUS ID:59409<br />

Description: Synopsis :\n\nThe remote host has a mail client installed that is vulnerable to multiple<br />

vulnerabilities.\n\nFor your information, the observed version of Thunderbird is : \n %L<br />

\n\nVersions of Thunderbird 12.x are potentially affected by the following security issues<br />

:\n\n - An error exists in the ASN.1 decoder when handling zero length items that can lead<br />

to application crashes. (CVE-2012-0441)\n\n - Multiple memory corruption errors exist.<br />

(CVE-2012-1937, CVE-2012-1038)\n\n - Two heap-based buffer overflows and one<br />

heap-based use-after-free error exist and are potentially exploitable. (CVE-2012-1940,<br />

CVE-2012-1941, CVE-2012-1947)\n\n - Two arbitrary DLL load issues exist related to the<br />

application update and update service functionality. (CVE-2012-1942,<br />

CVE-2012-1943)\n\n - The inline-script blocking feature of the 'Content <strong>Security</strong> Policy'<br />

(CSP) does not properly block inline event handlers. This error allows remote attackers to<br />

more easily carry out cross-site scripting attacks. (CVE-2012-1944)\n\n - A use-after-free<br />

error exists related to replacing or inserting a node into a web document.<br />

(CVE-2012-1946)\n<br />

Solution: Upgrade to Thunderbird 13.0 or later.<br />

CVE-2012-1947<br />

Roving Constant Contact E-mail Marketing Client Detection<br />

<strong>PVS</strong> ID: 6499 FAMILY: SMTP Clients RISK: INFO NESSUS ID:Not Available<br />

Description: The remote host is running the Roving Constant Contact E-mail client. Roving<br />

Constant Contact is a software which includes the capability to launch e-mail<br />

marketing campaigns.<br />

Solution: Ensure that such software is authorized for your network<br />

CVE Not available<br />

iTunes < 10.6.3 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 6500 FAMILY: Web Clients RISK: HIGH NESSUS ID:59499<br />

Description: Synopsis :\n\nThe remote host contains a multimedia application that has multiple<br />

vulnerabilities.\n\nThe remote host has iTunes installed, a popular media player for<br />

Windows and Mac OS. For your information, the observed version of iTunes is:\n %L<br />

\n\nVersions of iTunes earlier than 10.6.3 are reportedly affected by the following<br />

issues:\n\n - A memory corruption issue exists in WebKit that can allow malicious websites<br />

to crash the application and possibly execute arbitrary code. (CVE-2012-0672)\n\n - A<br />

heap-based buffer overflow exists related to the handling of 'm3u' playlist files. This error<br />

can cause the application to crash or possibly allow arbitrary code execution.<br />

(CVE-2012-0677)\n<br />

Solution: Upgrade to iTunes 10.6.3 or later.<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

Family Internet Services 1775

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!